{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:10:17Z","timestamp":1762377017754,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534410","type":"proceedings-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T22:32:08Z","timestamp":1632436328000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Attack-Guided Efficient Robustness Verification of ReLU Neural Networks"],"prefix":"10.1109","author":[{"given":"Yiwei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2808470"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3290354"},{"key":"ref10","first-page":"10825","article-title":"Fast and effective robustness certification","author":"singh","year":"2018","journal-title":"31th NeurIPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref12","first-page":"5273","article-title":"Towards fast computation of certified robustness for relu networks","volume":"80","author":"weng","year":"2018","journal-title":"35th ICML ser Proceedings of Machine Learning Research"},{"key":"ref13","article-title":"Evaluating robustness of neural networks with mixed integer programming","author":"tjeng","year":"2019","journal-title":"7th ICLR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/130915303"},{"key":"ref15","first-page":"6369","article-title":"Efficient formal safety analysis of neural networks","author":"wang","year":"2018","journal-title":"31th NeurIPS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5729"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/824"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898717716"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"ref4","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"The 3rd ICLR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-018-9285-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106640"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref29","first-page":"550","article-title":"A dual approach to scalable verification of deep networks","author":"dvijotham","year":"2018","journal-title":"34th UAI"},{"key":"ref5","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd ICLRE"},{"key":"ref8","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"6th ICLR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911825"},{"key":"ref9","article-title":"Algorithms for verifying deep neural networks","volume":"abs 1903 6758","author":"liu","year":"2019","journal-title":"CoRR"},{"key":"ref1","first-page":"2852","article-title":"Deep neural networks segment neuronal membranes in electron microscopy images","author":"ciresan","year":"2012","journal-title":"26th NIPS"},{"key":"ref20","first-page":"1599","article-title":"Formal security analysis of neural networks using symbolic intervals","author":"wang","year":"2018","journal-title":"27th USENIX Security Symposium USENIX Security 2018"},{"key":"ref22","article-title":"Certified defenses against adversarial examples","author":"raghunathan","year":"2018","journal-title":"6th ICLR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref23","article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","volume":"abs 1708 7747","author":"xiao","year":"2017","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_18"},{"key":"ref25","article-title":"An approach to reachability analysis for feed-forward relu neural networks","volume":"abs 1706 7351","author":"lomuscio","year":"2017","journal-title":"CoRR"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534410.pdf?arnumber=9534410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:03Z","timestamp":1652197563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534410","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}